Succesful DLP stories from different industries like healthcare, finance, hotel industry & environmental services.
AON implemented Endpoint Protector to prevent data loss and to secure their company’s and customers’ confidential information with advanced granular control.
Aspire Pharmaceuticals implemented Endpoint Protector to secure and protect their customers’ sensitive data, to monitor employees’activity and to add additional security against insider threats.
Aspect, an award-winning Creative Advertising agency, controls macOS devices and monitors data movement around the company
Netcore implemented Endpoint Protector to safeguard confidential data and to ensure compliance with different industry standards and regulations on their Linux and Windows-running devices.
Tiger Analytics implemented Endpoint Protector to closely monitor employee activity related to transfers in order to prevent sensitive data from being leaked, across their Linux and Windows computers.
Patient First implemented Endpoint Protector to better monitor employees’ activity and data transfers in order to secure their customers’ sensitive information, and to help be compliant with data protection regulations such as HIPAA and PCI DSS.
Veolia Water implemented Endpoint Protector to secure their sensitive data in order to avoid data breaches that could compromise their competitive advantage. They also wanted to make ensure data encryption on removable devices.
Mandarin Oriental Hotel
Mandarin Oriental Hotel implemented Endpoint Protector to protect again sensitive data leaks and to control and monitor portable storage devices in order to secure the know-how across various departments.
Fusionex chose Endpoint Protector to restrict USB port access and to allow it for application deployment and debugging purposes only. They wanted to protect their source code using an intuitive solution.
Leading consulting company for R&D financing prevents data breaches with Endpoint Protector DLP.
JJB Sports implemented Endpoint Protector to get better protection against data loss or theft, malware and other security breaches and to better control data being transferred through various means.
Mafilm Audio implemented Endpoint Protector to add additional security, to better protect against data loss and data leaks, especially to protect against small portable devices across their macOS devices.
Spectrum of Hope
Spectrum of Hope protects patients and improves security and compliance with CoSoSys’ Endpoint Protector.
Freiburg University benefits from proactive protection against portable storage devices.
Zeppelin Airship Technology
Zeppelin Airship Technology secures portable devices and ports with the Endpoint Protector Hardware Appliance.
Paymark implemented Endpoint Protector to secure and protect their customers’ sensitive data, and to better control and manage the risks of portable storage devices without blocking them.
Caudex Services Ltd
Caudex Services implemented Endpoint Protector because they wanted an easy to use and effective solution for their business, unlike their past solution which was letting them down.
Publishing and Printing company implements Data Loss Prevention, safeguarding copyright–protected content.
PURE Jingles implemented Endpoint Protector to better protect sensitive media files and projects against disastrous data leaks. Its general granularity allows only necessary restrictions to be put in place so it doesn’t influence productivity.
Zelltek SA, biosimilars production and commercialization company controls data leakage with Endpoint Protector.
Erich Utsch AG
Erich Utsch AG implemented Endpoint Protector to restrict and allow access to removable media on a user basis and to monitor employee activity in regards to data transfers on both Windows and Linux OS.
JFE Engineering implemented Endpoint Protector to efficiently protect against data loss and to closely monitor employee activity in regards to data transfers. They also wanted an additional layer of security.
Samsung SDS is using Endpoint Protector to efficiently control and block different devices that can connect through peripheral ports, such as USB drives, printers, mobile phones, keyboards, and more.
Liebherr Iberica implemented Endpoint Protector to manage insider threats so they avoid any malicious activity from taking place, to add an extra layer of security, and to be compliant with regulations such as GDPR.
Honda Lock Mexico is using Endpoint Protector to monitor, control, and block USB and peripheral ports, specifically mobile devices that can connect to the computers via Bluetooth.
One of the world’s leading contact lens companies is using Endpoint Protector to control how sensitive data is shared across its network and to ensure it complies with data privacy regulations.
Aadhar Housing Finance Ltd.
One of the largest affordable housing finance companies in India is using Endpoint Protector to safeguard sensitive data such as personally identifiable information (PII) and to comply with RBI guidelines.
Samsung R&D Institute
A multinational company is using Endpoint Protector to control PC peripherals and data transfers in a multi-OS environment.
The global business advisory firm is using Endpoint Protector to safeguard data when employees work remotely and to comply with standards like ISO27001 and ISO27017.
Provider of a leading healthcare data activation platform, Innovvaccer Inc. uses Endpoint Protector to gain visibility and control over file transfers and ensure data security while working remotely.
As a network of general hospitals, the Haßberg Clinics use Endpoint Protector to secure a wide range of confidential data, like Patient Care Data, Personal Health Information (PHI), and Personally Identifiable Information (PII).
Diakonie Herzogsägmühle implemented Endpoint Protector to manage insider threats and to monitor employee activity in regards to sensitive data transfers, but to also be compliant with regulations such as the GDPR.
Customer Communications Group
A full-service marketing agency, Customer Communications Group, manages insider threats and meets data compliance requirements with Endpoint Protector.
Gulf Insurance Group
Gulf Insurance is amongst the largest and most diversified insurance networks in the Middle East and North Africa. Established in 1962, the company now has many subsidiaries with the headquarters and main branch located in Kuwait. Gulf Insurance Group covers a variety of risks related to Motor, Marine & Aviation, Property & Casualty, and Life & Health Insurance both in conventional and Takaful (Islamic insurance based on Shariah principles) basis.
STEINEL Normalien AG
STEINEL, a manufacturer of fabricated metal and hardware products, uses Endpoint Protector to ensure data security on multiple operating systems, including Linux.